Author: ultroni1

  • Describe the capabilities of Privileged identity Management

    Privileged Identity Management (PIM) is a service of Microsoft Entra ID that enables you to manage, control, and monitor access to important resources in your organization. These include resources in Microsoft Entra, Azure, and other Microsoft online services such as Microsoft 365 or Microsoft Intune. PIM mitigates the risks of excessive, unnecessary, or misused access permissions. It requires justification to understand why users want permissions, and enforces multifactor authentication to activate any role.

    PIM is:

    • Just in time, providing privileged access only when needed, and not before.
    • Time-bound, by assigning start and end dates that indicate when a user can access resources.
    • Approval-based, requiring specific approval to activate privileges.
    • Visible, sending notifications when privileged roles are activated.
    • Auditable, allowing a full access history to be downloaded.

    Why use PIM?

    PIM reduces the chance of a malicious actor getting access by minimizing the number of people who have access to secure information or resources. By time-limiting authorized users, it reduces the risk of an authorized user inadvertently affecting sensitive resources. PIM also provides oversight for what users are doing with their administrator privileges.

  • Describe entitlement management

    Entitlement management is an identity governance feature that enables organizations to manage the identity and access lifecycle at scale. Entitlement management automates access request workflows, access assignments, reviews, and expiration.

    • Users may not know what access they should have, and even if they do, they might have difficulty locating the right individuals to approve it.
    • When users find and receive access to a resource, they may hold on to access longer than is required for business purposes.
    • Managing access for external users.

    Entitlement management includes the following capabilities to address these challenges:

    • Delegate the creation of access packages to non-administrators. These access packages contain resources that users can request. The delegated access package managers then define policies that include rules such as which users can request access, who must approve their access, and when access expires.
    • Managing external users. When a user who isn’t yet in your directory requests access, and is approved, they’re automatically invited into your directory and assigned access. When their access expires, if they have no other access package assignments, their B2B account in your directory can be automatically removed.
  • Manage user and guest user access with access reviews

    With access reviews, you can easily ensure that users or guests have appropriate access. You can ask the users themselves or a decision maker to participate in an access review and recertify (or attest) to users’ access. The reviewers can give their input on each user’s need for continued access based on suggestions from Microsoft Entra ID. When an access review is finished, you can then make changes and remove access from users who no longer need it.

    Admins who create access reviews can track progress as the reviewers complete their process. No access rights are changed until the review is finished. You can, however, stop a review before it reaches its scheduled end.

    When the review is complete, it can be set to manually or autoapply changes to remove access from a group membership or application assignment, except for a dynamic group or a group that originates on-premises. In those cases, the changes must be applied directly to the group

  • Describe access reviews

    Microsoft Entra access reviews enable organizations to efficiently manage group memberships, access to enterprise applications, and role assignment. Regular access reviews ensure that only the right people have access to resources. Excessive access rights are a known security risk. However, when people move between teams, or take on or relinquish responsibilities, access rights can be difficult to control.

    Microsoft Entra ID enables you to collaborate with users from inside your organization and with external users. Users can join groups, invite guests, connect to cloud apps, and work remotely from their work or personal devices. This convenience has led to a need for better access management capabilities.

    There are many use cases in which access reviews should be used. Here are just a few examples.

    • Too many users in privileged roles: It’s a good idea to check how many users have administrative access and if there are any invited guests or partners that haven’t been removed after being assigned to do an administrative task. You can recertify the role assignment of users in Microsoft Entra roles or Azure resources roles in the Microsoft Entra Privileged Identity Management (PIM) experience.
    • Business critical data access: For certain resources, such as business critical applications, it might be required as part of compliance processes to ask people to regularly reconfirm and give a justification on why they need continued access.
    • To maintain a policy’s exception list: Sometimes there are business cases that require you to make exceptions to policies. As the IT admin, you can manage this task and provide auditors with proof that these exceptions are reviewed regularly.
    • Ask group owners to confirm they still need guests in their groups: If a group gives guests access to business sensitive content, then it’s the group owner’s responsibility to confirm the guests still have a legitimate business need for access.
    • Have reviews recur periodically: You can set up recurring access reviews of users at set frequencies such as weekly, monthly, quarterly or annually. Reviewers are notified at the start of each review and upon completion approve or deny access through a friendly user interface and with the help of smart recommendations.
  • Describe Microsoft Entra ID Governance

    Microsoft Entra ID Governance allows you to balance your organization’s need for security and employee productivity with the right processes and visibility. As employees’ roles change within an organization, you can use Microsoft Entra ID Governance to automatically ensure that the right people have the right access to the right resources, with identity and access process automation, delegation to business groups, and increased visibility.

    ID Governance gives organizations the ability to do the following tasks:

    • Govern the identity lifecycle.
    • Govern access lifecycle.
    • Secure privileged access for administration.

    These actions can be completed for employees, business partners and vendors, and across services and applications, both on-premises and in the cloud.

    It’s intended to help organizations address these four key questions:

    • Which users should have access to which resources?
    • What are those users doing with that access?
    • Are there effective organizational controls for managing access?
    • Can auditors verify that the controls are working?
  • Access the portal

    You access the Microsoft Defender for Endpoint through a web portal using an internet browser. From there, you can monitor device activities, investigate and remediate alerts, perform hunting activities, configure global settings, and more.

    Now that you’ve learned about the capabilities and components of Microsoft Defender for Endpoint, you want to know whether you can access it in a familiar way. You need to ensure that your administration and security teams can configure settings and investigate problems from wherever they are.

    Here, you’ll learn about the Microsoft Defender portal.

  • Use Microsoft Defender for Endpoint

    Unprotected or misconfigured devices can pose a risk to your organization. Attackers can take advantage and do damage to your devices or data. Many organizations have suffered reputational and financial loss at the hands of attackers. To protect your organization, you need to protect your devices.

    In your medium-sized organization, you’re concerned that your security posture may not be as secure as it needs to be, given the attacks that are regularly attempted from malicious actors. You want to know if Microsoft Defender for Endpoint can help to reduce weaknesses in your computers.

    Here, you’re going to look into how Microsoft Defender for Endpoint can help you to achieve your goal.

  • Use patterns to differentiate similar utterances

    In some cases, a model might contain multiple intents for which utterances are likely to be similar. You can use the pattern of utterances to disambiguate the intents while minimizing the number of sample utterances.

    For example, consider the following utterances:

    • “Turn on the kitchen light”
    • “Is the kitchen light on?”
    • “Turn off the kitchen light”

    These utterances are syntactically similar, with only a few differences in words or punctuation. However, they represent three different intents (which could be named TurnOnDeviceGetDeviceStatus, and TurnOffDevice). Additionally, the intents could apply to a wide range of entity values. In addition to “kitchen light”, the intent could apply to “living room light”, television”, or any other device that the model might need to support.

  • Define intents, utterances, and entities

    Utterances are the phrases that a user might enter when interacting with an application that uses your language model. An intent represents a task or action the user wants to perform, or more simply the meaning of an utterance. You create a model by defining intents and associating them with one or more utterances.

    For example, consider the following list of intents and associated utterances:

    • GetTime:
      • “What time is it?”
      • “What is the time?”
      • “Tell me the time”
    • GetWeather:
      • “What is the weather forecast?”
      • “Do I need an umbrella?”
      • “Will it snow?”
    • TurnOnDevice
      • “Turn the light on.”
      • “Switch on the light.”
      • “Turn on the fan”
    • None:
      • “Hello”
      • “Goodbye”

    In your model, you must define the intents that you want your model to understand, so spend some time considering the domain your model must support and the kinds of actions or information that users might request. In addition to the intents that you define, every model includes a None intent that you should use to explicitly identify utterances that a user might submit, but for which there is no specific action required (for example, conversational greetings like “hello”) or that fall outside of the scope of the domain for this model.

  • Onboard Azure Arc-enabled servers to Microsoft Sentinel

    Tailwind Traders has onboarded its machines to Azure Arc-enabled servers, and now wants to onboard those servers to Microsoft Sentinel. In this unit, you learn how to onboard your Azure Arc-enabled servers to Microsoft Sentinel. First, you connect the Azure Arc-enabled server to a Log Analytics workspace. Second, you enable Microsoft Sentinel on this workspace.